A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2018-03-26 15:29
Updated : 2023-11-07 02:55
NVD link : CVE-2018-1301
Mitre link : CVE-2018-1301
CVE.ORG link : CVE-2018-1301
JSON object : View
Products Affected
apache
- http_server
netapp
- storage_automation_store
- santricity_cloud_connector
- clustered_data_ontap
- storagegrid
canonical
- ubuntu_linux
redhat
- enterprise_linux
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer